24,140 research outputs found

    The Immune System: the ultimate fractionated cyber-physical system

    Full text link
    In this little vision paper we analyze the human immune system from a computer science point of view with the aim of understanding the architecture and features that allow robust, effective behavior to emerge from local sensing and actions. We then recall the notion of fractionated cyber-physical systems, and compare and contrast this to the immune system. We conclude with some challenges.Comment: In Proceedings Festschrift for Dave Schmidt, arXiv:1309.455

    Refining the PoinTER “human firewall” pentesting framework

    Get PDF
    PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the importance of the human in the organisation, and the need to ensure that humans are resistant to cyber-attacks. To achieve this, some organisations “pentest” their employees, testing their resilience and ability to detect and repel human-targeted attacks. In a previous paper we reported on PoinTER (Prepare TEst Remediate), a human pentesting framework, tailored to the needs of SMEs. In this paper, we propose improvements to refine our framework. The improvements are based on a derived set of ethical principles that have been subjected to ethical scrutiny.MethodologyWe conducted a systematic literature review of academic research, a review of actual hacker techniques, industry recommendations and official body advice related to social engineering techniques. To meet our requirements to have an ethical human pentesting framework, we compiled a list of ethical principles from the research literature which we used to filter out techniques deemed unethical.FindingsDrawing on social engineering techniques from academic research, reported by the hacker community, industry recommendations and official body advice and subjecting each technique to ethical inspection, using a comprehensive list of ethical principles, we propose the refined GDPR compliant and privacy respecting PoinTER Framework. The list of ethical principles, we suggest, could also inform ethical technical pentests.OriginalityPrevious work has considered penetration testing humans, but few have produced a comprehensive framework such as PoinTER. PoinTER has been rigorously derived from multiple sources and ethically scrutinised through inspection, using a comprehensive list of ethical principles derived from the research literature

    The North Atlantic alliance and collective defense at 70: confession and response revisited

    Get PDF
    The North Atlantic Treaty was largely a response to global sentiment that other international organizations, namely the United Nations, were not accomplishing their intended purpose of the maintenance and promotion of peace and order in the world. This had a magnifying effect due to the global trauma and destruction that had been witnessed by the world following World War II. This Article visits the realities of history that led to the formation of NATO as a collective measure for self-defense and the effectiveness it had as a response to global concern of peace preservation. Importantly, this Article analyzes the substantive military functioning articles of the North Atlantic Treaty, namely Article 5. This Article serves to provide a reflection on the instability and overwhelming concerns that motivated the creation of NATO and its rippling effect felt globally as a responsory action. Lastly, this Article positions collective self-defense in the context off issues faced in 2019 and how it serves to respond to them

    Outer Space: The Final Frontier or the Final Battlefield?

    Get PDF
    Current law concerning the militarization and weaponization of outer space is inadequate for present times. The increased implementation of “dual-use” space technologies poses obstacles for the demilitarization of space. This paper examines how far the militarization of space should be taken and also whether weapons of any kind should be placed in space. Further steps must be taken in international space law to attempt to keep the militarization and weaponization of space under control in order to promote and maintain a free outer space for research and exploration
    • …
    corecore